• 제목/요약/키워드: ~Becoming

Search Result 6,551, Processing Time 0.03 seconds

A study on the Improvement of the Defense R&D applying the CAIV Concept (CAIV개념을 적용한 국방연구개발 개선방안 연구)

  • 박재영;최석철
    • Journal of the military operations research society of Korea
    • /
    • v.27 no.2
    • /
    • pp.1-24
    • /
    • 2001
  • As the weapon systems of the 21st century are becoming more and more performance /technoloriven, it is only becoming more expensive to obtain the weapon systems. Therefore, it is absolutely vital for every nation to find a way to reduce cost objectives. As CAIV is a strategy that entails setting aggressive, yet realistic cost objectives when defining operational requirements and acquiring defense systems and managing achievement of these objectives, we believe that it is essential for us to find out what it is and how we can adopt it so that we can provide ourselves with highly capable systems that are affordable. Therefore, In this paper we will give a brief overview of CAIV that is one of the main acquisition strategies adopted by DoD of U.S. including some case studies of CAIV. Furthermore, the paper will analyze stated cost objectives in our country and suggest realistic opportunities for cost reduction.

  • PDF

Students and Teachers′Perceptions on the Goals of Mathematics Education -A Foundational Research for the Development of Mathematics Curriculum Model for a Creative Knowledge-based Society- (창조적 지식기만사회의 수학교육과정 개발을 위한 기초조사연구 -수학교육목표에 대한 교사.학생의 인식-)

  • 노선숙;김민경;유현주;차인숙
    • The Mathematical Education
    • /
    • v.40 no.2
    • /
    • pp.161-177
    • /
    • 2001
  • This study is to investigate what students want to learn and what mathematics teachers should teach in their classrooms. 1314 students and 527 mathematics teachers were randomly selected to administer the questionnaire. The result shows that their is a considerable mismatch between students'learning desires and teachers'teaching practices in classrooms. What students want to learn is creative knowledge; however, what they learn in the classroom is ‘imitative’ knowledge. This study suggests that the overall educational goal of mathematics education in Korea should emphasize (1) learning to communicate mathematically, (2) loaming to reason mathematically, (3) becoming confident in pupils'own ability, (4) learning to$.$value mathematics, and (5) becoming mathematical problem solvers.

  • PDF

Classification of Livestock Raising Area and Spatial Mobility (가축사육의 지역분류와 공간이동에 관한 연구)

  • 김재환;박치호;강희설;곽정훈;최동윤;최희철
    • Journal of Animal Environmental Science
    • /
    • v.7 no.1
    • /
    • pp.45-56
    • /
    • 2001
  • The following statistics are the results of a survey that analyzed the classification of livestock area and spatial mobility based upon the number of livestock and an area of 151 towns and cities from 1975 to 1995. 1. As a results of analysis about the degree of location concentration using C.V., Korean native cattles (HanWoo) and swines are becoming more centralized while dairies and chickens are becoming decentralized. 2. 49 regions, that is 32.5%, were classified as growing regions, 30 regions (19.9%) were stagnant regions and 72 regions (47.7%) were withering regions. The classification was based upon the calculation according to the numbers of converted grown animals and growth index. Kyonggi-do and Chungchongnam-do, specifically, took up 26.6% and 24.5% of the developing regions which shows that these two regions are the dominant regions for livestock. 3. Kyongsangbuk-do and Chungchongnam-do play significant roles for overall livestock, and Chollanam-do is considering a transition from swines to Korean native cattles and Kyongsangbuk-do is shifting from Korean native cattles to swines.

  • PDF

An Design Exploration Technique of a Hybrid Memory for Artificial Intelligence Applications (인공지능 응용을 위한 하이브리드 메모리 설계 탐색 기법)

  • Cho, Doo-San
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.531-536
    • /
    • 2021
  • As artificial intelligence technology advances, it is being applied to various application fields. Artificial intelligence is performing well in the field of image recognition and classification. Chip design specialized in this field is also actively being studied. Artificial intelligence-specific chips are designed to provide optimal performance for the applications. At the design task, memory component optimization is becoming an important issue. In this study, the optimal algorithm for the memory size exploration is presented, and the optimal memory size is becoming as a important factor in providing a proper design that meets the requirements of performance, cost, and power consumption.

Analysis of Deep Learning Methods for Classification and Detection of Malware

  • Moon, Phil-Joo
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.291-297
    • /
    • 2021
  • Recently, as the number of new and variant malicious codes has increased exponentially, malware warnings are being issued to PC and smartphone users. Malware is becoming more and more intelligent. Efforts to protect personal information are becoming more and more important as social issues are used to stimulate the interest of PC users and allow users to directly download malicious codes. In this way, it is difficult to prevent malicious code because malicious code infiltrates in various forms. As a countermeasure to solve these problems, many studies are being conducted to apply deep learning. In this paper, we investigate and analyze various deep learning methods to detect and classify malware.

Crowdsourced Urban Sensing: Urban Travel Behavior Using Mobile Based Sensing

  • Shin, Dongyoun
    • Architectural research
    • /
    • v.20 no.4
    • /
    • pp.109-120
    • /
    • 2018
  • In the context of ever-faster urbanization, cities are becoming increasingly complex, and data collection to understand such complex relationships is becoming a very important factor. This paper focuses on the lighter weight of the method of collecting urban data, and studied how to use such complementary data collection using crowdsourcing. Especially, the method of converting mobile acceleration sensor information to urban trip information by combining with locational information was experimented. Using the parameters for transportation type classification obtained from the research, information was obtained and verified in Singapore and Zurich. The result of this study is thought to be a good example of how to combine raw data into meaningful behavior information.

Enhancing of Security Ethics Model base on Scenario in Future Autonomous Vehicle Accident (미래 자율주행 자동차 사고에서 시나리오 기반의 보안 윤리 모델 연구)

  • Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.105-112
    • /
    • 2018
  • Along with the recent technological development, autonomous vehicles are being commercialized. but The accident of autonomous driving car is becoming an issue, and safety problem of autonomous driving car is becoming a hot topic. Also There are currently no specific guidelines for clear laws and security ethics. These guidelines require a lot of information and experience. This study establishes basic guidelines based on cases of accidents from past to present. This study suggests security considerations through case study of security ethics in autonomous car accident.

  • PDF

A Study on the PCA base Face Authentication System for Untact Work (비대면(Untact) 업무를 위한 화상인식 PCA 사용자 인증 시스템 연구)

  • Park, jongsoon;Park, chankil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.67-74
    • /
    • 2020
  • As the information age develops, Online education and Non-face-to-face work are becoming common. Telecommuting such as tele-education and video conferencing through the application of information technology is also becoming common due to the COVID-19. Unexpected information leakage can occur online when the company conducts work remotely or holds meetings. A system to authenticate users is needed to reduce information leakage. In this study, there are various ways to authenticate remote access users. By applying burn authentication using a biometric system, a method to identify users is proposed. The method used in the study was studied the main component analysis method, which recognizes several characteristics in facial recognition and processes interrelationships. It proposed a method that can be easily utilized without additional devices by utilizing a camera connected to a computer by authenticating the user using the shape and characteristics of the face by using the PCA method.

The Ripple Effects of Climate X-Events

  • Sang-Keun Cho;Ji-Min Lee;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.3
    • /
    • pp.83-88
    • /
    • 2023
  • The increasing global average temperature and the emergence of various abnormal climate phenomena are already being experienced in reality. The problems arising from climate change are expanding and becoming catastrophic, despite the efforts of various organizations to prevent them. In order to avoid climate issues from becoming black elephants, we conducted interviews with emergency planning officer from various institutions to identify potential X-events caused by climate change. The results of analyzing the anticipated X-events by these emergency planning officer revealed a chain of ripple effects associated with their occurrence. This implies that once an X-event happens, its influence is broader and more significant. Through this study, we aim to share the understanding of the ripple effects of climate X-events with many people, raising awareness of the severity of climate issues. We hope that this will serve as a starting point for more institutions, individuals, and nations to make efforts in resolving climate problems, turning X-events into opportunities rather than crises.

Asymmetric Terrorist Alliances: Strategic Choices of Militant Groups in Southeast Asia

  • Alexandrova, Iordanka
    • SUVANNABHUMI
    • /
    • v.11 no.1
    • /
    • pp.101-132
    • /
    • 2019
  • Why do some local rebel groups choose to form asymmetric alliances with large transnational terrorist organizations? This paper examines asymmetric terrorist alliance patterns by studying the international ties of domestic insurgencies in Southeast Asia. It uses data from Indonesia, Malaysia, the Philippines, and Thailand to construct a theory defining the determinants of the choice of alliance strategies by terrorist groups. The findings conclude that rebels with limited aims prefer to act alone out of fear of entrapment. They are cautious of becoming associated with the struggle of transnational radical groups and provoking organized response from international and regional counterterrorism authorities. Local groups are more likely to seek alliance with an established movement when they have ambitious final objectives, challenging the core interests of the target state. In this case, the benefits of training and logistic support provided by an experienced organization outweigh the costs of becoming a target for coordinated counterterrorist campaign.

  • PDF